Impact
Nanobot’s WhatsApp bridge defaults to listening on all network interfaces (0.0.0.0) and does not enforce authentication. An attacker who can reach port 3001 can connect via WebSocket, hijack the WhatsApp session, send messages as the user, intercept all inbound messages and media, and capture authentication QR codes. This vulnerability permits full control of the user’s messaging session without user credentials.
Affected Systems
The vulnerability affects Nanobot installations by HKUDS that use the default WebSocket server configuration. All versions released before the latest known fix (v0.1.3.post7) are potentially vulnerable. Current version information beyond the release tag is not provided, so any deployment using the default interface binding is at risk.
Risk and Exploitability
The CVSS score of 10 assigns critical severity, yet the EPSS score of less than 1% indicates a low likelihood of exploitation currently. This vulnerability is not yet listed in CISA’s KEV catalog, suggesting no confirmed public exploits. Nonetheless, anyone who can reach Nanobot’s WebSocket on port 3001 has a direct path to hijack a WhatsApp session, allowing message spoofing, interception, and QR‑code theft, which could compromise user confidentiality and trust.
OpenCVE Enrichment